well this is bad
my laptop has just decided to grow scanlines
first i thought it was just the gpu driver crapping itself so i rebooted but it's on bios splash screen and everywhere
About 1.5 years ago my friend was (falsely) accused of terrorism.
All of their electronic devices were seized, plus my stash of hard drives (stored at their place for reasons).
Of course police didnโt find any evidence. Culprit that impersonated my friend (and many others) got arrested recently (article in Polish).
Police returned the hardware few months ago and I found that all of my drives are now e-waste thanks to their carelessness, which made me (understandably) furious. I even considered suing them.
Said very good friend of mine entrusted me with their personal phone and pattern to unlock it. I charged and booted it for the first time since February 2024 and were curious how it was pwned. I knew police used cellebrite on it.
My crime is that of curiosity
As it turns out, police forgot to clean after themselves (there was an attempt) and left payloads, logs, and backdoor intact.
Took a peek at the first-stage payload but itโs too complex for me to reverse-engineer on my own. Itโs relatively well obfuscated, but I can tell itโs using RNDIS (likely spawning a server?) and TLS-encrypted connection to talk to Cellebrite box.
If youโre a security researcher (or just curious nerd with more spoons than me) and you would like to take a look - here you go.
Payload was uploaded onto the device on 2024-02-21. If you want to re-create the environment it was executed on, you will need a:
Rough execution flow:
1. USB device plugged in (Cellebrite Cheetah)
2. USB controller switches to host mode
3. Gadget switching USB VID/PID to load kernel modules (hid_steam, hid_apple, hid_prodikeys, hid_logitech_hidpp, hid_magicmouse, hid_aksys and tries to exploit quirks)
4. Module 'hid_aksys' leaks memory
5. Screen unlocked
6. ADB key '82:E5:EA:F3:DC:D1:7D:CA:65:3C:D4:58:65:CD:81:8E' added to trusted keys on the device
7. First-stage payload '/data/local/tmp/falcon' copied onto the device.
8. Second-stage payload (seemingly) executed as root:
- /data/local/tmp/chrome-command-line
- /data/local/tmp/android-webview-command-line
- /data/local/tmp/webview-command-line
- /data/local/tmp/content-shell-command-line
- /data/local/tmp/frida-server-16.1.4-android-arm64
- /data/local/tmp/init
9. Data extraction (photos, telegram, firefox, downloads)
Have fun!
Four bendy buses managed to enter a roundabout at the exact same time from four different directions in Oslo yesterday afternoon and get properly stuck, each bus blocking the exit for the one behind it. #BigBusStuck
You meet the users where they are.
You have literally no idea how much this paid off. The number of infected media players people downloaded in the age before Windows Media Player had more than three codecs is unimaginable
Who knows if I saved the entire firm doing this
I think it is time to cancel Xiaomi products, since HyperOS the bootloader unlock is nearly impossible.
I must be old. I really donโt understand emoji reactions. If I say โIโm on the bus and will be there in half an hourโ to the group message, why do five people need to react with the bus emoji? A thumbs up or a heart or a smile I get. It communicates some sort of information. You like it, or youโre happy, or whatever. But all reacting โbusโ communicates is thatโฆthe word bus was in the original message, and you recognized it! Yes! Good for you! You recognized the word bus! Do you want a cookie or something?
talking about wild product design, I recently stumbled upon a british eBay offer that I don't wanna keep from you.
RIGHT ANGLE COMPUTER
BSD, Lunix, Debian and Mandrake are all versions of an illegal hacker operation system, invented by a Soviet computer hacker named Linyos Torovoltos, before the Russians lost the Cold War. It is based on a program called "xenix", which was written by Microsoft for the US government. These programs are used by hackers to break into other people's computer systems to steal credit card numbers. They may also be used to break into people's stereos to steal their music, using the "mp3" program. Torovoltos is a notorious hacker, responsible for writing many hacker programs, such as "telnet", which is used by hackers to connect to machines on the internet without using a telephone.
Congratulations to everybody who worked on the recently tagged megapixels 2 release! ๐
Is anybody interested in taking over maintainership of the Alpine Linux package, packaging libmegapixels as well and upgrading Megapixels to version 2? I'm the current maintainer and probably won't have time for this soon. I'm happy to review the diff in APKBUILDs though.
If so, just send a merge request with your changes against aports, thanks :)
https://gitlab.alpinelinux.org/alpine/aports/-/tree/master/community/megapixels
Do you consent to have your picture taken at #39C3?